Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2010 Issue 9
Application of Digital Signature to Office Automation System
wang zuo ; li dong ; guo xin qi
..............page:76-77,80
Radio Equipment and Inspection for Drilling Platform
jiang peng
..............page:73-75
Analysis of Process Gain Based on SNR of Despread Signal
guo zhi qing ; pan feng
..............page:62-64
Isolation and Exchange Across Security Domain
hu jian bin
..............page:13
Questions & Answers in Web Security(3)
..............page:30-31
Exploration on Network-Security Hotspot
wang hui bo
..............page:19-20,34
Analysis of Hopping Anti-jamming Performance Based on RMFSK
zuo yun ; ning zhi de ; zhong jian bo
..............page:58-61
xin xi dong tai
..............page:2-9,57,86,90
Study on Risk Assessment Algorithms Based on Scene Check
shi feng ; gan lu
..............page:70-72
An Anti-occlusion and Automatic Tracking Algorithm Based on Mean-shift
song tao ; li lin tao ; song zhen yu
..............page:65-67
Authentication of Customer Identity in e-bank
zhang huan jiong
..............page:78-80
On Account of UTM2,Intranet Security Becomes Simple
yuan zhi hui
..............page:17
Integrated Security Solution for Terminals
zhou xian jing
..............page:42
Simulation Analysis of Colored Gaussian Process Based on Sum of Rician Sinusoid
zhang jia ming ; yang ming chuan ; guo qing
..............page:55-57,61
Blue-shield Intranet Security and Privacy System
xu jun
..............page:52-53
Application of Fuzzy FP-growth to Intrusion Detection
feng xiang ; shuai jian mei
..............page:87-90